xref: /linux/fs/proc/generic.c (revision bef9ae3d883ce908d8879fff0cd2c3971f5ee4b4)
1 /*
2  * proc/fs/generic.c --- generic routines for the proc-fs
3  *
4  * This file contains generic proc-fs routines for handling
5  * directories and files.
6  *
7  * Copyright (C) 1991, 1992 Linus Torvalds.
8  * Copyright (C) 1997 Theodore Ts'o
9  */
10 
11 #include <linux/errno.h>
12 #include <linux/time.h>
13 #include <linux/proc_fs.h>
14 #include <linux/stat.h>
15 #include <linux/mm.h>
16 #include <linux/module.h>
17 #include <linux/slab.h>
18 #include <linux/mount.h>
19 #include <linux/init.h>
20 #include <linux/idr.h>
21 #include <linux/namei.h>
22 #include <linux/bitops.h>
23 #include <linux/spinlock.h>
24 #include <linux/completion.h>
25 #include <asm/uaccess.h>
26 
27 #include "internal.h"
28 
29 DEFINE_SPINLOCK(proc_subdir_lock);
30 
31 static int proc_match(unsigned int len, const char *name, struct proc_dir_entry *de)
32 {
33 	if (de->namelen != len)
34 		return 0;
35 	return !memcmp(name, de->name, len);
36 }
37 
38 /* buffer size is one page but our output routines use some slack for overruns */
39 #define PROC_BLOCK_SIZE	(PAGE_SIZE - 1024)
40 
41 static ssize_t
42 __proc_file_read(struct file *file, char __user *buf, size_t nbytes,
43 	       loff_t *ppos)
44 {
45 	struct inode * inode = file->f_path.dentry->d_inode;
46 	char 	*page;
47 	ssize_t	retval=0;
48 	int	eof=0;
49 	ssize_t	n, count;
50 	char	*start;
51 	struct proc_dir_entry * dp;
52 	unsigned long long pos;
53 
54 	/*
55 	 * Gaah, please just use "seq_file" instead. The legacy /proc
56 	 * interfaces cut loff_t down to off_t for reads, and ignore
57 	 * the offset entirely for writes..
58 	 */
59 	pos = *ppos;
60 	if (pos > MAX_NON_LFS)
61 		return 0;
62 	if (nbytes > MAX_NON_LFS - pos)
63 		nbytes = MAX_NON_LFS - pos;
64 
65 	dp = PDE(inode);
66 	if (!(page = (char*) __get_free_page(GFP_TEMPORARY)))
67 		return -ENOMEM;
68 
69 	while ((nbytes > 0) && !eof) {
70 		count = min_t(size_t, PROC_BLOCK_SIZE, nbytes);
71 
72 		start = NULL;
73 		if (dp->read_proc) {
74 			/*
75 			 * How to be a proc read function
76 			 * ------------------------------
77 			 * Prototype:
78 			 *    int f(char *buffer, char **start, off_t offset,
79 			 *          int count, int *peof, void *dat)
80 			 *
81 			 * Assume that the buffer is "count" bytes in size.
82 			 *
83 			 * If you know you have supplied all the data you
84 			 * have, set *peof.
85 			 *
86 			 * You have three ways to return data:
87 			 * 0) Leave *start = NULL.  (This is the default.)
88 			 *    Put the data of the requested offset at that
89 			 *    offset within the buffer.  Return the number (n)
90 			 *    of bytes there are from the beginning of the
91 			 *    buffer up to the last byte of data.  If the
92 			 *    number of supplied bytes (= n - offset) is
93 			 *    greater than zero and you didn't signal eof
94 			 *    and the reader is prepared to take more data
95 			 *    you will be called again with the requested
96 			 *    offset advanced by the number of bytes
97 			 *    absorbed.  This interface is useful for files
98 			 *    no larger than the buffer.
99 			 * 1) Set *start = an unsigned long value less than
100 			 *    the buffer address but greater than zero.
101 			 *    Put the data of the requested offset at the
102 			 *    beginning of the buffer.  Return the number of
103 			 *    bytes of data placed there.  If this number is
104 			 *    greater than zero and you didn't signal eof
105 			 *    and the reader is prepared to take more data
106 			 *    you will be called again with the requested
107 			 *    offset advanced by *start.  This interface is
108 			 *    useful when you have a large file consisting
109 			 *    of a series of blocks which you want to count
110 			 *    and return as wholes.
111 			 *    (Hack by Paul.Russell@rustcorp.com.au)
112 			 * 2) Set *start = an address within the buffer.
113 			 *    Put the data of the requested offset at *start.
114 			 *    Return the number of bytes of data placed there.
115 			 *    If this number is greater than zero and you
116 			 *    didn't signal eof and the reader is prepared to
117 			 *    take more data you will be called again with the
118 			 *    requested offset advanced by the number of bytes
119 			 *    absorbed.
120 			 */
121 			n = dp->read_proc(page, &start, *ppos,
122 					  count, &eof, dp->data);
123 		} else
124 			break;
125 
126 		if (n == 0)   /* end of file */
127 			break;
128 		if (n < 0) {  /* error */
129 			if (retval == 0)
130 				retval = n;
131 			break;
132 		}
133 
134 		if (start == NULL) {
135 			if (n > PAGE_SIZE) {
136 				printk(KERN_ERR
137 				       "proc_file_read: Apparent buffer overflow!\n");
138 				n = PAGE_SIZE;
139 			}
140 			n -= *ppos;
141 			if (n <= 0)
142 				break;
143 			if (n > count)
144 				n = count;
145 			start = page + *ppos;
146 		} else if (start < page) {
147 			if (n > PAGE_SIZE) {
148 				printk(KERN_ERR
149 				       "proc_file_read: Apparent buffer overflow!\n");
150 				n = PAGE_SIZE;
151 			}
152 			if (n > count) {
153 				/*
154 				 * Don't reduce n because doing so might
155 				 * cut off part of a data block.
156 				 */
157 				printk(KERN_WARNING
158 				       "proc_file_read: Read count exceeded\n");
159 			}
160 		} else /* start >= page */ {
161 			unsigned long startoff = (unsigned long)(start - page);
162 			if (n > (PAGE_SIZE - startoff)) {
163 				printk(KERN_ERR
164 				       "proc_file_read: Apparent buffer overflow!\n");
165 				n = PAGE_SIZE - startoff;
166 			}
167 			if (n > count)
168 				n = count;
169 		}
170 
171  		n -= copy_to_user(buf, start < page ? page : start, n);
172 		if (n == 0) {
173 			if (retval == 0)
174 				retval = -EFAULT;
175 			break;
176 		}
177 
178 		*ppos += start < page ? (unsigned long)start : n;
179 		nbytes -= n;
180 		buf += n;
181 		retval += n;
182 	}
183 	free_page((unsigned long) page);
184 	return retval;
185 }
186 
187 static ssize_t
188 proc_file_read(struct file *file, char __user *buf, size_t nbytes,
189 	       loff_t *ppos)
190 {
191 	struct proc_dir_entry *pde = PDE(file->f_path.dentry->d_inode);
192 	ssize_t rv = -EIO;
193 
194 	spin_lock(&pde->pde_unload_lock);
195 	if (!pde->proc_fops) {
196 		spin_unlock(&pde->pde_unload_lock);
197 		return rv;
198 	}
199 	pde->pde_users++;
200 	spin_unlock(&pde->pde_unload_lock);
201 
202 	rv = __proc_file_read(file, buf, nbytes, ppos);
203 
204 	pde_users_dec(pde);
205 	return rv;
206 }
207 
208 static ssize_t
209 proc_file_write(struct file *file, const char __user *buffer,
210 		size_t count, loff_t *ppos)
211 {
212 	struct proc_dir_entry *pde = PDE(file->f_path.dentry->d_inode);
213 	ssize_t rv = -EIO;
214 
215 	if (pde->write_proc) {
216 		spin_lock(&pde->pde_unload_lock);
217 		if (!pde->proc_fops) {
218 			spin_unlock(&pde->pde_unload_lock);
219 			return rv;
220 		}
221 		pde->pde_users++;
222 		spin_unlock(&pde->pde_unload_lock);
223 
224 		/* FIXME: does this routine need ppos?  probably... */
225 		rv = pde->write_proc(file, buffer, count, pde->data);
226 		pde_users_dec(pde);
227 	}
228 	return rv;
229 }
230 
231 
232 static loff_t
233 proc_file_lseek(struct file *file, loff_t offset, int orig)
234 {
235 	loff_t retval = -EINVAL;
236 	switch (orig) {
237 	case 1:
238 		offset += file->f_pos;
239 	/* fallthrough */
240 	case 0:
241 		if (offset < 0 || offset > MAX_NON_LFS)
242 			break;
243 		file->f_pos = retval = offset;
244 	}
245 	return retval;
246 }
247 
248 static const struct file_operations proc_file_operations = {
249 	.llseek		= proc_file_lseek,
250 	.read		= proc_file_read,
251 	.write		= proc_file_write,
252 };
253 
254 static int proc_notify_change(struct dentry *dentry, struct iattr *iattr)
255 {
256 	struct inode *inode = dentry->d_inode;
257 	struct proc_dir_entry *de = PDE(inode);
258 	int error;
259 
260 	error = inode_change_ok(inode, iattr);
261 	if (error)
262 		return error;
263 
264 	setattr_copy(inode, iattr);
265 	mark_inode_dirty(inode);
266 
267 	de->uid = inode->i_uid;
268 	de->gid = inode->i_gid;
269 	de->mode = inode->i_mode;
270 	return 0;
271 }
272 
273 static int proc_getattr(struct vfsmount *mnt, struct dentry *dentry,
274 			struct kstat *stat)
275 {
276 	struct inode *inode = dentry->d_inode;
277 	struct proc_dir_entry *de = PROC_I(inode)->pde;
278 	if (de && de->nlink)
279 		set_nlink(inode, de->nlink);
280 
281 	generic_fillattr(inode, stat);
282 	return 0;
283 }
284 
285 static const struct inode_operations proc_file_inode_operations = {
286 	.setattr	= proc_notify_change,
287 };
288 
289 /*
290  * This function parses a name such as "tty/driver/serial", and
291  * returns the struct proc_dir_entry for "/proc/tty/driver", and
292  * returns "serial" in residual.
293  */
294 static int __xlate_proc_name(const char *name, struct proc_dir_entry **ret,
295 			     const char **residual)
296 {
297 	const char     		*cp = name, *next;
298 	struct proc_dir_entry	*de;
299 	unsigned int		len;
300 
301 	de = *ret;
302 	if (!de)
303 		de = &proc_root;
304 
305 	while (1) {
306 		next = strchr(cp, '/');
307 		if (!next)
308 			break;
309 
310 		len = next - cp;
311 		for (de = de->subdir; de ; de = de->next) {
312 			if (proc_match(len, cp, de))
313 				break;
314 		}
315 		if (!de) {
316 			WARN(1, "name '%s'\n", name);
317 			return -ENOENT;
318 		}
319 		cp += len + 1;
320 	}
321 	*residual = cp;
322 	*ret = de;
323 	return 0;
324 }
325 
326 static int xlate_proc_name(const char *name, struct proc_dir_entry **ret,
327 			   const char **residual)
328 {
329 	int rv;
330 
331 	spin_lock(&proc_subdir_lock);
332 	rv = __xlate_proc_name(name, ret, residual);
333 	spin_unlock(&proc_subdir_lock);
334 	return rv;
335 }
336 
337 static DEFINE_IDA(proc_inum_ida);
338 static DEFINE_SPINLOCK(proc_inum_lock); /* protects the above */
339 
340 #define PROC_DYNAMIC_FIRST 0xF0000000U
341 
342 /*
343  * Return an inode number between PROC_DYNAMIC_FIRST and
344  * 0xffffffff, or zero on failure.
345  */
346 int proc_alloc_inum(unsigned int *inum)
347 {
348 	unsigned int i;
349 	int error;
350 
351 retry:
352 	if (!ida_pre_get(&proc_inum_ida, GFP_KERNEL))
353 		return -ENOMEM;
354 
355 	spin_lock_bh(&proc_inum_lock);
356 	error = ida_get_new(&proc_inum_ida, &i);
357 	spin_unlock_bh(&proc_inum_lock);
358 	if (error == -EAGAIN)
359 		goto retry;
360 	else if (error)
361 		return error;
362 
363 	if (i > UINT_MAX - PROC_DYNAMIC_FIRST) {
364 		spin_lock_bh(&proc_inum_lock);
365 		ida_remove(&proc_inum_ida, i);
366 		spin_unlock_bh(&proc_inum_lock);
367 		return -ENOSPC;
368 	}
369 	*inum = PROC_DYNAMIC_FIRST + i;
370 	return 0;
371 }
372 
373 void proc_free_inum(unsigned int inum)
374 {
375 	spin_lock_bh(&proc_inum_lock);
376 	ida_remove(&proc_inum_ida, inum - PROC_DYNAMIC_FIRST);
377 	spin_unlock_bh(&proc_inum_lock);
378 }
379 
380 static void *proc_follow_link(struct dentry *dentry, struct nameidata *nd)
381 {
382 	nd_set_link(nd, PDE(dentry->d_inode)->data);
383 	return NULL;
384 }
385 
386 static const struct inode_operations proc_link_inode_operations = {
387 	.readlink	= generic_readlink,
388 	.follow_link	= proc_follow_link,
389 };
390 
391 /*
392  * As some entries in /proc are volatile, we want to
393  * get rid of unused dentries.  This could be made
394  * smarter: we could keep a "volatile" flag in the
395  * inode to indicate which ones to keep.
396  */
397 static int proc_delete_dentry(const struct dentry * dentry)
398 {
399 	return 1;
400 }
401 
402 static const struct dentry_operations proc_dentry_operations =
403 {
404 	.d_delete	= proc_delete_dentry,
405 };
406 
407 /*
408  * Don't create negative dentries here, return -ENOENT by hand
409  * instead.
410  */
411 struct dentry *proc_lookup_de(struct proc_dir_entry *de, struct inode *dir,
412 		struct dentry *dentry)
413 {
414 	struct inode *inode = NULL;
415 	int error = -ENOENT;
416 
417 	spin_lock(&proc_subdir_lock);
418 	for (de = de->subdir; de ; de = de->next) {
419 		if (de->namelen != dentry->d_name.len)
420 			continue;
421 		if (!memcmp(dentry->d_name.name, de->name, de->namelen)) {
422 			pde_get(de);
423 			spin_unlock(&proc_subdir_lock);
424 			error = -ENOMEM;
425 			inode = proc_get_inode(dir->i_sb, de);
426 			goto out_unlock;
427 		}
428 	}
429 	spin_unlock(&proc_subdir_lock);
430 out_unlock:
431 
432 	if (inode) {
433 		d_set_d_op(dentry, &proc_dentry_operations);
434 		d_add(dentry, inode);
435 		return NULL;
436 	}
437 	if (de)
438 		pde_put(de);
439 	return ERR_PTR(error);
440 }
441 
442 struct dentry *proc_lookup(struct inode *dir, struct dentry *dentry,
443 		unsigned int flags)
444 {
445 	return proc_lookup_de(PDE(dir), dir, dentry);
446 }
447 
448 /*
449  * This returns non-zero if at EOF, so that the /proc
450  * root directory can use this and check if it should
451  * continue with the <pid> entries..
452  *
453  * Note that the VFS-layer doesn't care about the return
454  * value of the readdir() call, as long as it's non-negative
455  * for success..
456  */
457 int proc_readdir_de(struct proc_dir_entry *de, struct file *filp, void *dirent,
458 		filldir_t filldir)
459 {
460 	unsigned int ino;
461 	int i;
462 	struct inode *inode = filp->f_path.dentry->d_inode;
463 	int ret = 0;
464 
465 	ino = inode->i_ino;
466 	i = filp->f_pos;
467 	switch (i) {
468 		case 0:
469 			if (filldir(dirent, ".", 1, i, ino, DT_DIR) < 0)
470 				goto out;
471 			i++;
472 			filp->f_pos++;
473 			/* fall through */
474 		case 1:
475 			if (filldir(dirent, "..", 2, i,
476 				    parent_ino(filp->f_path.dentry),
477 				    DT_DIR) < 0)
478 				goto out;
479 			i++;
480 			filp->f_pos++;
481 			/* fall through */
482 		default:
483 			spin_lock(&proc_subdir_lock);
484 			de = de->subdir;
485 			i -= 2;
486 			for (;;) {
487 				if (!de) {
488 					ret = 1;
489 					spin_unlock(&proc_subdir_lock);
490 					goto out;
491 				}
492 				if (!i)
493 					break;
494 				de = de->next;
495 				i--;
496 			}
497 
498 			do {
499 				struct proc_dir_entry *next;
500 
501 				/* filldir passes info to user space */
502 				pde_get(de);
503 				spin_unlock(&proc_subdir_lock);
504 				if (filldir(dirent, de->name, de->namelen, filp->f_pos,
505 					    de->low_ino, de->mode >> 12) < 0) {
506 					pde_put(de);
507 					goto out;
508 				}
509 				spin_lock(&proc_subdir_lock);
510 				filp->f_pos++;
511 				next = de->next;
512 				pde_put(de);
513 				de = next;
514 			} while (de);
515 			spin_unlock(&proc_subdir_lock);
516 	}
517 	ret = 1;
518 out:
519 	return ret;
520 }
521 
522 int proc_readdir(struct file *filp, void *dirent, filldir_t filldir)
523 {
524 	struct inode *inode = filp->f_path.dentry->d_inode;
525 
526 	return proc_readdir_de(PDE(inode), filp, dirent, filldir);
527 }
528 
529 /*
530  * These are the generic /proc directory operations. They
531  * use the in-memory "struct proc_dir_entry" tree to parse
532  * the /proc directory.
533  */
534 static const struct file_operations proc_dir_operations = {
535 	.llseek			= generic_file_llseek,
536 	.read			= generic_read_dir,
537 	.readdir		= proc_readdir,
538 };
539 
540 /*
541  * proc directories can do almost nothing..
542  */
543 static const struct inode_operations proc_dir_inode_operations = {
544 	.lookup		= proc_lookup,
545 	.getattr	= proc_getattr,
546 	.setattr	= proc_notify_change,
547 };
548 
549 static int proc_register(struct proc_dir_entry * dir, struct proc_dir_entry * dp)
550 {
551 	struct proc_dir_entry *tmp;
552 	int ret;
553 
554 	ret = proc_alloc_inum(&dp->low_ino);
555 	if (ret)
556 		return ret;
557 
558 	if (S_ISDIR(dp->mode)) {
559 		if (dp->proc_iops == NULL) {
560 			dp->proc_fops = &proc_dir_operations;
561 			dp->proc_iops = &proc_dir_inode_operations;
562 		}
563 		dir->nlink++;
564 	} else if (S_ISLNK(dp->mode)) {
565 		if (dp->proc_iops == NULL)
566 			dp->proc_iops = &proc_link_inode_operations;
567 	} else if (S_ISREG(dp->mode)) {
568 		if (dp->proc_fops == NULL)
569 			dp->proc_fops = &proc_file_operations;
570 		if (dp->proc_iops == NULL)
571 			dp->proc_iops = &proc_file_inode_operations;
572 	}
573 
574 	spin_lock(&proc_subdir_lock);
575 
576 	for (tmp = dir->subdir; tmp; tmp = tmp->next)
577 		if (strcmp(tmp->name, dp->name) == 0) {
578 			WARN(1, KERN_WARNING "proc_dir_entry '%s/%s' already registered\n",
579 				dir->name, dp->name);
580 			break;
581 		}
582 
583 	dp->next = dir->subdir;
584 	dp->parent = dir;
585 	dir->subdir = dp;
586 	spin_unlock(&proc_subdir_lock);
587 
588 	return 0;
589 }
590 
591 static struct proc_dir_entry *__proc_create(struct proc_dir_entry **parent,
592 					  const char *name,
593 					  umode_t mode,
594 					  nlink_t nlink)
595 {
596 	struct proc_dir_entry *ent = NULL;
597 	const char *fn = name;
598 	unsigned int len;
599 
600 	/* make sure name is valid */
601 	if (!name || !strlen(name))
602 		goto out;
603 
604 	if (xlate_proc_name(name, parent, &fn) != 0)
605 		goto out;
606 
607 	/* At this point there must not be any '/' characters beyond *fn */
608 	if (strchr(fn, '/'))
609 		goto out;
610 
611 	len = strlen(fn);
612 
613 	ent = kzalloc(sizeof(struct proc_dir_entry) + len + 1, GFP_KERNEL);
614 	if (!ent)
615 		goto out;
616 
617 	memcpy(ent->name, fn, len + 1);
618 	ent->namelen = len;
619 	ent->mode = mode;
620 	ent->nlink = nlink;
621 	atomic_set(&ent->count, 1);
622 	spin_lock_init(&ent->pde_unload_lock);
623 	INIT_LIST_HEAD(&ent->pde_openers);
624 out:
625 	return ent;
626 }
627 
628 struct proc_dir_entry *proc_symlink(const char *name,
629 		struct proc_dir_entry *parent, const char *dest)
630 {
631 	struct proc_dir_entry *ent;
632 
633 	ent = __proc_create(&parent, name,
634 			  (S_IFLNK | S_IRUGO | S_IWUGO | S_IXUGO),1);
635 
636 	if (ent) {
637 		ent->data = kmalloc((ent->size=strlen(dest))+1, GFP_KERNEL);
638 		if (ent->data) {
639 			strcpy((char*)ent->data,dest);
640 			if (proc_register(parent, ent) < 0) {
641 				kfree(ent->data);
642 				kfree(ent);
643 				ent = NULL;
644 			}
645 		} else {
646 			kfree(ent);
647 			ent = NULL;
648 		}
649 	}
650 	return ent;
651 }
652 EXPORT_SYMBOL(proc_symlink);
653 
654 struct proc_dir_entry *proc_mkdir_mode(const char *name, umode_t mode,
655 		struct proc_dir_entry *parent)
656 {
657 	struct proc_dir_entry *ent;
658 
659 	ent = __proc_create(&parent, name, S_IFDIR | mode, 2);
660 	if (ent) {
661 		if (proc_register(parent, ent) < 0) {
662 			kfree(ent);
663 			ent = NULL;
664 		}
665 	}
666 	return ent;
667 }
668 EXPORT_SYMBOL(proc_mkdir_mode);
669 
670 struct proc_dir_entry *proc_net_mkdir(struct net *net, const char *name,
671 		struct proc_dir_entry *parent)
672 {
673 	struct proc_dir_entry *ent;
674 
675 	ent = __proc_create(&parent, name, S_IFDIR | S_IRUGO | S_IXUGO, 2);
676 	if (ent) {
677 		ent->data = net;
678 		if (proc_register(parent, ent) < 0) {
679 			kfree(ent);
680 			ent = NULL;
681 		}
682 	}
683 	return ent;
684 }
685 EXPORT_SYMBOL_GPL(proc_net_mkdir);
686 
687 struct proc_dir_entry *proc_mkdir(const char *name,
688 		struct proc_dir_entry *parent)
689 {
690 	return proc_mkdir_mode(name, S_IRUGO | S_IXUGO, parent);
691 }
692 EXPORT_SYMBOL(proc_mkdir);
693 
694 struct proc_dir_entry *create_proc_entry(const char *name, umode_t mode,
695 					 struct proc_dir_entry *parent)
696 {
697 	struct proc_dir_entry *ent;
698 	nlink_t nlink;
699 
700 	if (S_ISDIR(mode)) {
701 		if ((mode & S_IALLUGO) == 0)
702 			mode |= S_IRUGO | S_IXUGO;
703 		nlink = 2;
704 	} else {
705 		if ((mode & S_IFMT) == 0)
706 			mode |= S_IFREG;
707 		if ((mode & S_IALLUGO) == 0)
708 			mode |= S_IRUGO;
709 		nlink = 1;
710 	}
711 
712 	ent = __proc_create(&parent, name, mode, nlink);
713 	if (ent) {
714 		if (proc_register(parent, ent) < 0) {
715 			kfree(ent);
716 			ent = NULL;
717 		}
718 	}
719 	return ent;
720 }
721 EXPORT_SYMBOL(create_proc_entry);
722 
723 struct proc_dir_entry *proc_create_data(const char *name, umode_t mode,
724 					struct proc_dir_entry *parent,
725 					const struct file_operations *proc_fops,
726 					void *data)
727 {
728 	struct proc_dir_entry *pde;
729 	nlink_t nlink;
730 
731 	if (S_ISDIR(mode)) {
732 		if ((mode & S_IALLUGO) == 0)
733 			mode |= S_IRUGO | S_IXUGO;
734 		nlink = 2;
735 	} else {
736 		if ((mode & S_IFMT) == 0)
737 			mode |= S_IFREG;
738 		if ((mode & S_IALLUGO) == 0)
739 			mode |= S_IRUGO;
740 		nlink = 1;
741 	}
742 
743 	pde = __proc_create(&parent, name, mode, nlink);
744 	if (!pde)
745 		goto out;
746 	pde->proc_fops = proc_fops;
747 	pde->data = data;
748 	if (proc_register(parent, pde) < 0)
749 		goto out_free;
750 	return pde;
751 out_free:
752 	kfree(pde);
753 out:
754 	return NULL;
755 }
756 EXPORT_SYMBOL(proc_create_data);
757 
758 static void free_proc_entry(struct proc_dir_entry *de)
759 {
760 	proc_free_inum(de->low_ino);
761 
762 	if (S_ISLNK(de->mode))
763 		kfree(de->data);
764 	kfree(de);
765 }
766 
767 void pde_put(struct proc_dir_entry *pde)
768 {
769 	if (atomic_dec_and_test(&pde->count))
770 		free_proc_entry(pde);
771 }
772 
773 /*
774  * Remove a /proc entry and free it if it's not currently in use.
775  */
776 void remove_proc_entry(const char *name, struct proc_dir_entry *parent)
777 {
778 	struct proc_dir_entry **p;
779 	struct proc_dir_entry *de = NULL;
780 	const char *fn = name;
781 	unsigned int len;
782 
783 	spin_lock(&proc_subdir_lock);
784 	if (__xlate_proc_name(name, &parent, &fn) != 0) {
785 		spin_unlock(&proc_subdir_lock);
786 		return;
787 	}
788 	len = strlen(fn);
789 
790 	for (p = &parent->subdir; *p; p=&(*p)->next ) {
791 		if (proc_match(len, fn, *p)) {
792 			de = *p;
793 			*p = de->next;
794 			de->next = NULL;
795 			break;
796 		}
797 	}
798 	spin_unlock(&proc_subdir_lock);
799 	if (!de) {
800 		WARN(1, "name '%s'\n", name);
801 		return;
802 	}
803 
804 	spin_lock(&de->pde_unload_lock);
805 	/*
806 	 * Stop accepting new callers into module. If you're
807 	 * dynamically allocating ->proc_fops, save a pointer somewhere.
808 	 */
809 	de->proc_fops = NULL;
810 	/* Wait until all existing callers into module are done. */
811 	if (de->pde_users > 0) {
812 		DECLARE_COMPLETION_ONSTACK(c);
813 
814 		if (!de->pde_unload_completion)
815 			de->pde_unload_completion = &c;
816 
817 		spin_unlock(&de->pde_unload_lock);
818 
819 		wait_for_completion(de->pde_unload_completion);
820 
821 		spin_lock(&de->pde_unload_lock);
822 	}
823 
824 	while (!list_empty(&de->pde_openers)) {
825 		struct pde_opener *pdeo;
826 
827 		pdeo = list_first_entry(&de->pde_openers, struct pde_opener, lh);
828 		list_del(&pdeo->lh);
829 		spin_unlock(&de->pde_unload_lock);
830 		pdeo->release(pdeo->inode, pdeo->file);
831 		kfree(pdeo);
832 		spin_lock(&de->pde_unload_lock);
833 	}
834 	spin_unlock(&de->pde_unload_lock);
835 
836 	if (S_ISDIR(de->mode))
837 		parent->nlink--;
838 	de->nlink = 0;
839 	WARN(de->subdir, KERN_WARNING "%s: removing non-empty directory "
840 			"'%s/%s', leaking at least '%s'\n", __func__,
841 			de->parent->name, de->name, de->subdir->name);
842 	pde_put(de);
843 }
844 EXPORT_SYMBOL(remove_proc_entry);
845